How This Briefing Works
This report opens with key findings, then maps the gaps between what Unbounce discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
pending
“Awaiting scanner verification”
Runtime cookie behavior and third-party script execution not yet observed by BLACKOUT scanner
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for Unbounce
- →- Audit all third-party scripts deployed via Script Manager and verify each is disclosed in your privacy policy and covered by visitor consent. - Review Zapier integration data flows to ensure lead data is not being shared with platforms beyond your documented processing relationships. - Confirm the cookie banner is properly configured to gate external tracker execution on consent rather than relying on default behavior. - Assess Smart Traffic AI implications for attribution accuracy and ensure downstream analytics account for AI-driven variant selection. - Verify IP address logging practices align with your privacy policy disclosures, particularly for EU visitors under GDPR.
Negotiation Leverage
- →When negotiating with Unbounce, request clarity on data retention policies for visitor IP addresses, behavioral data, and form submission records. Ask what happens to visitor data collected via Unbounce's own analytics versus data processed through third-party scripts deployed via Script Manager. Key contractual protections should include data portability guarantees for all lead data, restrictions on Unbounce's use of aggregated visitor data for product improvement or benchmarking, and clear SLAs on data deletion upon account termination. For EU-focused operations, confirm that Unbounce's claim of EU data residency for lead data extends to all data types including IP logs and behavioral analytics, not just form submissions.
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
36 detection signatures across scripts, domains, cookies, and network endpoints